Content Posted in 2025
An Exploration of Machine Learning Security, Carson Kendall Grandi Koball
Aphanomyces root rot of alfalfa disease survey in Eastern South Dakota establishes widespread pathogen distribution, Jennifer M. Giles, Conner L. Tordsen, and Andrew E. Sathoff
Assessing Commercial Biological Control Agents for Activity Against Alfalfa Root Rotting Pathogens, Travis R. Rebstock, Conner L. Tordsen, Brandon Daniels, Oleksandra Rachynska, and Andrew E. Sathoff
Assessing Commercial Biological Control Agents for Activity Against South Dakota Alfalfa Pathogens, Conner L. Tordsen and Andrew E. Sathoff
A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals, Sunil Arora and John D. Hastings
A Teacher Apprenticeship Pathway in a Rural, Midwest State: Perspectives of Teacher Apprentices, Megan Schuh, Jennifer Nash, David DeJong, and Ryan Young
A Teacher Apprenticeship Pathway in a Rural, Midwest State: Perspectives of Teacher Apprentices, Megan Schuh, Jennifer Nash, Ryan Young, and David De Jong
Automatic Heap Primitive Detection for Exploit Development, Rachel Glockenmeier
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code, Gary McCully, John Hastings, Shengjie Xu, and Adam Fortier
Bones et. al: Educational Human Skeletons Restoration and Investigation, Emelye Josko and Andrew E. Sathoff
Bone Surface Modification Dataset Synthesis for Computer Vision Models Using LoRA Tuned Latent Diffusion Models, Jason Mixon
Confronting the Reproducibility Crisis: A Case Study of Challenges in Cybersecurity AI, Richard H. Moulton, Gary A. McCully, and John D. Hastings
Experiential Learning Through Simulations in Fully Online Asynchronous Courses: Exploring the role of self-debriefing, David De Jong and Sara Dexter
Exploring an AI Chatbot to Close School Counselor Information Gaps: A Design Science Approach, Kalee Crandall
Factors Influencing Blockchain Implementation in Supply Chain Management: An Exploratory Study, Aravindh Sekar
Flying through the air with the greatest of ease? Evaluation of glide capability in basal maniraptoran theropods, Norah Zoller, Kierra Miller, Michael B. Habib, Hans C. Larsson, and T. Alexander Deccechi
Functional analysis of differentially expressed genes in alfalfa (Medicago sativa) inoculated with Aphanomyces euteiches race 1 and race 2, Jay Alexander, Deborah A. Samac, and Andrew E. Sathoff
Identification and Characterization of Pythium Species Isolated From Commercial Alfalfa Fields in South Dakota, Oleksandra Rachynska, Travis R. Rebstock, Conner L. Tordsen, Jennifer M. Giles, and Andrew E. Sathoff
Impact of Organizational Changes on BI Critical Success Factors, Badr Harfoush
Improving Survey Methods to Better Detect Rare Grassland Birds in South Dakota, Kassy Hendricks, Kristel K. Bakker, and Chuck Dieter
Isolation and Characterization of Pythium spp. from South Dakota soils under commerical alfalfa production, Jennifer M. Giles and Andrew E. Sathoff
Managing South Dakota Alfalfa Diseases with Commercial Biological Control Agents, Travis R. Rebstock, Conner L. Tordsen, Brandon Daniels, Oleksandra Rachynska, and Andrew E. Sathoff
Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation, Sunil Arora and John Hastings
Mirage: A VBA Macro Emulator for Behavioral Analysis Powered by Machine Learning, Corey Mathew Hartman
Optimal Algorithm for Managing On-Campus Student Transportation, Youssef Harrath, Jood AlYusuf, Zeena Ghulam, and Muna AlDoseri
Prescriptive Zero Trust: Assessing the Impact of Zero Trust on Cyber Attack Prevention, Samuel T. Aiello
Pure Nash Equilibrium and Strong Nash Equilibrium Computation in Additive Aggregate Games, Jared Soundy, Mohammad T. Irfan, and Hau Chan
Quantitative Real-Time PCR Identification of Soybean Pathogens in Eastern South Dakota Soil, Brandon Daniels, Oleksandra Rachynska, Travis R. Rebstock, Conner L. Tordsen, and Andrew E. Sathoff
RUFF: Resource Usage Fuzzing Framework, Gavin Black
Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy, Suvineetha Herath, Haywood Gelman, John Hastings, and Yong Wang
Securing Modbus via Proxied Approach, Kyle Korman
SETC: A Vulnerability Telemetry Collection Framework, Ryan Holeman, John Hastings, and Varghese Mathew Vaidyan
Terror from the Skies?: Investigating the energetics and feeding ecology of one of the largest pterosaurs: Quetzalcoatlus northropi, Kierra Miller and T. Alexander Deccechi
The Art of Campaigning: Joint Planners Working at the Intersections of Everything, Mary Bell, Edgar M. Hollandsworth, Thomas J. Snukis, Jeffrey Turner, Luke P. Bellocchi, Nicholas Anthony, Steve Tribble, Chris Botterbusch, and Justin D. Harper
The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action, Sunil Arora, Sahil Arora, and John Hastings
The Role of Privacy in the Intention to Disclose Personal Driving Data Using Internet-of-Vehicle Technology in Consumer Automobiles, Steven Bradley Fowler
The Well-Being of a University: The Relationship Between Gratitude and Organizational Commitment on Faculty Members' Intention to Stay, Brenda Merkel, Kristi Bockorny, Amber Henderson, and Aaron Scholl
Toward an Insider Threat Education Platform: A Theoretical Literature Review, Haywood Gelman, John D. Hastings, David Kenley, and Eleanor Loiacono
Toward extracting scattering phase shift from integrated correlation functions. III. Coupled channels, Peng Guo and Frank Lee
Transforming Information Systems Management: A Reference Model for Digital Engineering Integration, john bonar and John Hastings
Transforming Information Systems Management: A Reference Model for Digital Engineering Integration, John Bonar and John Hastings
Using LLMs to Establish Implicit User Sentiment of Software Desirability, Sherri Weitl-Harms, John D. Hastings, and Jonah Lum
Utilizing Large Language Models to Synthesize Product Desirability Datasets, John D. Hastings, Sherri Weitl-Harms, Joseph Doty, Zachary L. Myers, and Warren Thompson